LET'S CHAT
COVENANT Dashboard - AI-powered portfolio monitoring

AI-Powered Portfolio Monitoring

Portfolio Monitoring That Never Sleeps

A quarterly review is a smoke detector turned on 4 times a year. COVENANT is always on.

Track covenants across your entire portfolio. AI-powered analysis on dedicated infrastructure under our exclusive control. Sovereign by architecture. Know before your lenders do.

No hardware ships to your fund. Bare-metal infrastructure owned and operated by NHN. Fund connects via encrypted tunnel. Enterprise AI at small-firm prices.

100+
Covenant Types
<5min
Analysis Time
24/7
Monitoring

The Cost of Manual Covenant Tracking

73% of PE firms cite covenant monitoring as a major operational bottleneck.

Spreadsheet Hell

Covenant tracking doesn't scale. As your portfolio grows, spreadsheets become unmanageable, error-prone, and impossible to audit.

Reactive, Not Proactive

You find out about breaches after lenders call. By then, it's too late to negotiate or remediate. You're always playing catch-up.

Data Sovereignty Concerns

Sensitive financial data scattered across cloud tools. When LPs ask where their portfolio data lives, what's your answer?

The NO HUMAN NEARBY Advantage

Institutional-grade monitoring, delivered on your infrastructure.

๐Ÿ“Š

Automated Covenant Testing

AI automatically tests covenants against thresholds. Debt/EBITDA, Interest Coverage, Current Ratio - all monitored in real-time.

๐Ÿ”

AI-Powered Extraction

Upload financials in any format. Our AI extracts the data you need without manual entry or reformatting.

๐Ÿ”

Self-Hosted Security

Your data stays on your infrastructure. No third-party clouds. Full data sovereignty for LP compliance.

One Number. Whole Portfolio.

Stop staring at twelve spreadsheets. COVENANT rolls every portfolio company's covenant posture into one health score the investment committee can read in three seconds.

78/100
Portfolio Health
Your 24-company fund at a glance.

Real-time covenant testing across every LBO in the book. Green means tested and clean. Yellow means within ten percent of a covenant trip. Red means breach. Click through to any company for the full test-by-test drill-down.

19
Healthy
4
Watch List
1
In Breach
612
Tests / Quarter

Illustrative dashboard. Live product uses your fund's covenant schedule and financials.

BETA: Target Q3 2026

Weather Radar for Financial Contagion

One breach. Four defaults. You are seeing the topological map of how floodwaters spread across your capital structure before the original lender's demand letter lands. Predictive contagion modeling is in beta with founder-tier customers; production deployment targets Q3 2026.

A BREACH B EXPOSED C EXPOSED D EXPOSED E HEALTHY ORIGIN CROSS-DEFAULT RADIUS UNAFFECTED same lender ยท shared covenant ยท MFN clause
Active breach
Cross-default exposed
Healthy, isolated

Company A trips a leverage covenant. The radar picks up the contagion as it spreads: COVENANT's lender-graph analysis surfaces every shared-lender exposure, MFN clause, and cross-default provision that drags B, C, and D into the storm before the original lender's demand letter lands. Your workout team has a two-week head start.

BETA: Target Q3 2026 Portfolio Contagion Graph

Predictive Cross-Default Mapping, Honestly Scoped

Today's radar detects breach. The contagion graph predicts which other borrowers' collateral, lender-graph position, and cross-default provisions put them at risk before a breach trips. The graph is built directly on the covenant-agreement parsing the product already does: shared-lender pairs, pledged-collateral overlaps, MFN clause clusters, parent-subsidiary guarantee chains.

Beta opens to founder-tier customers in Q3 2026. We are deliberately not shipping it as a real-time dashboard until the false-positive rate is lower than the human-analyst baseline. Predicting contagion that does not happen is alert fatigue dressed up as foresight.

Out of scope: equity prices, CDS spreads, peer-comp valuations, real-time market data. The contagion graph is built from the covenant agreements the fund already holds. No external market data feeds, no shadow-banking concerns.

Three Tiers Of Confidence, Zero Alert Fatigue

A radar that fires on every drizzle trains its users to mute notifications. COVENANT routes every signal through a three-tier confidence classifier before it reaches a human. Pager-worthy signals stay pager-worthy.

Tier 1

Cascade Warning

High confidence. Cross-default cascade risk detected across 2+ borrowers with connected exposure.

Routes to: pager credit committee

Response: within 24 hours

Calibrated to fire under 5x per quarter per 200-facility fund.

Tier 2

Storm Forming

Medium confidence. Single-borrower covenant ratio deteriorating, debt-service coverage dropping past warning threshold, unplanned capex mid-quarter.

Routes to: portfolio manager daily digest

Response: within 5 business days

Per-PM sensitivity controls tune the floor.

Tier 3

Watch

Low confidence. Early signals, single data-point drift, not yet indicative of stress. Logged for pattern detection.

Routes to: weekly portfolio summary

Response: no immediate action

Feeds quarterly sensitivity recalibration.

Alert-history analytics recalibrate sensitivity quarterly based on tracked outcomes.

"Your last 20 Tier 2 alerts, 14 actionable, 6 noise, sensitivity auto-recalibrated." The radar gets sharper every quarter. The boy-who-cried-wolf problem is engineered out by design.

Tier 2 Density Cap

3 Signals Per Day. Hard Cap. No Digest Blindness.

A daily digest that bundles twelve lukewarm signals is just a junk drawer with a calendar. COVENANT caps the Tier 2 daily digest at the 3 most relevant signals per portfolio manager, with a steady-state guarantee of under 5 Tier 2 alerts per week.

When signal volume would exceed the cap, the system makes a hard decision: promote the highest-confidence candidate to Tier 1 (Cascade Warning, pager), or demote the lowest to Tier 3 (Watch, weekly digest). Never overflows.

In the alert preferences UI: "Your current digest is averaging 2.4 signals per day." The PM sees the cap working in real time.

Tier-2 Auto-Promotion Audit Log

Every Promote / Demote Decision Is Logged In The PM's Own Audit Trail

When the density cap forces a promote-or-demote, the system writes a structured audit row that the PM can re-open six months later. Confidence delta, alternatives considered, and a deep link to the underlying signal. Auto-triage logic stops being a black box.

Sample audit row
signal_id:    SIG-2026-04-26-0173
decision:     PROMOTED Tier 2 โ†’ Tier 1
timestamp:    2026-04-26T08:14:22-04:00
confidence:   0.973  (threshold for promote: 0.92)
reason:      cross_default_path detected (Borrowers A, C, F)
demoted:     [SIG-...0168 cap-ex-overrun 0.71,
             SIG-...0171 leverage-drift 0.68]
policy:      density_cap_v2 (3-per-day, rank-by-confidence)
audit_link:  /audit/SIG-2026-04-26-0173

During postmortem, the PM clicks audit_link and sees the full alert tree: which signals were considered, why this one beat them, what the confidence model weighted. If the model was wrong, the row is the receipt.

Conservative-By-Default

Sliders Ship Tuned For The Fiduciary, Not For The Vendor

COVENANT's per-PM sensitivity sliders ship with conservative defaults that catch roughly 95% of correlated breach signals as Tier 1. PMs can dial sensitivity down to fit their portfolio's volatility profile, but the factory default catches the "we should have been paged" cases where demoting a signal would later constitute a breach of fiduciary duty.

Every slider adjustment is logged, timestamped, and reasoned - the PM enters a short note. When the inevitable postmortem happens, the audit log answers "why was this signal demoted" with a dated reason in the PM's own words. The tuning tool is not a vendor liability shield. The defaults are the shield.

An Analyst Multiplier, Not An Analyst Substitute

COVENANT is an automated triage engine that flips the 90/10 ratio of senior-analyst time. The senior keeps the judgment calls. The radar handles the boilerplate.

Before COVENANT

90% Boilerplate, 10% Judgment

Your senior analysts spend 90% of their day reading boilerplate covenants, parsing standard reporting submissions, and re-keying numbers from PDFs into spreadsheets. The judgment calls (workout decisions, structural risk reads, intercreditor tactics) get the last 10% of an exhausted brain.

After COVENANT

10% Boilerplate, 90% Judgment

The triage engine ingests, parses, ratios, and tier-classifies every submission. The senior analyst opens the day looking at a tier-1 shortlist of cascade-risk signals already enriched with the underlying ratios and clause references. The judgment work gets a fresh brain.

What Stays Human

Every Tier-1 Signal Acknowledged

Every Cascade Warning is acknowledged by a human portfolio manager who has final disposition authority. The triage engine never autonomously fires a workout call, never autonomously closes a borrower, never makes a credit decision without a human sign-off. Multiplier, not substitute.

"An analyst multiplier, not an analyst substitute. The system proves to the human analyst that it knows exactly what it cannot see."

Honest Coping For The 80/20 Book

COVENANT continuously monitors the 80% of your book with clean data AND auto-generates targeted compliance enforcement requests to the 20% lagging behind. The radar does not wait for the data. The radar hunts the data down.

Per-Borrower Data Quality Grade

A to F, Visible On The Dashboard

A

Real-time API integration direct from the borrower's accounting system.

B

Scheduled daily structured push via Onboarding Wizard.

C

Monthly structured financial statements via Onboarding Wizard.

D

Quarterly structured financials (the legacy baseline).

F

Parsing failed. The model could not read this borrower's most recent submission. Routed to Compliance Friction.

COVENANT directs scarce human attention to the 20% that actively requires it, while fully automating the 80% that has clean data pipelines.

Every sub-A borrower ships with an auto-generated Path to A action list: "Re-negotiate reporting requirements in next amendment cycle," "Deploy Onboarding Wizard for this borrower," "Request API integration for upcoming refinancing." Portfolio coverage compounds as the action list closes out.

Parsing Confidence, Not Borrower Default

An F Means The AI Could Not Read The Document. It Does Not Mean The Borrower Defaulted.

The most common silent-failure mode in cloud covenant tools is conflating data quality with parsing confidence. A scanned PDF with a watermark looks identical to a scanned PDF that says "we breached our covenant" - if the parser fails on either, the system goes quiet. COVENANT refuses that conflation. Every F surfaces the precise failure mode and the action it triggers.

Failure Mode 1

Watermark / scan artifact

Borrower stamped a CONFIDENTIAL watermark across the income statement. Parser logs parse_fail.watermark_overlap. Routed to Compliance Friction with a request for an unwatermarked submission.

Failure Mode 2

OCR confidence floor

Image-only PDF, OCR confidence below floor across the financial-statement table. Parser logs parse_fail.ocr_below_floor. Routed for human escalation, never silently scored.

Failure Mode 3

Missing pages

Submission references Schedule 5.02 but the schedule was not included. Parser logs parse_fail.missing_schedule. Compliance request fires same-day, citing the contractual reporting obligation.

An F is a transparent admission that the radar could not see. The PM gets a named failure mode, a routing decision, and a tracked request. The system never goes silent on a borrower it cannot read.

Historical F-Grade Quarantine

One Click To Re-Parse Every Pre-v6 F-Grade With Named Failure Modes

The v6 parsing-confidence release made every new F-grade route to a named failure mode. F-grades issued before the release were silent on which failure mode caused them. The Quarantine Tool closes that gap. Turn the liability into a demonstration of customer care.

Pre-v6 F-Grade Quarantine · Admin Console

47 documents, 11 borrowers

Pre-v6 F-grades

47

Issued 2025-10 through 2026-04-15

Borrowers affected

11

Includes 3 with current Tier-2 signals

Re-parse ETA

~14 min

Sovereign inference, customer-scoped capacity

One-Click Action

Quarantine all pre-v6 F-grade documents pending re-parse. The system routes each into the Compliance Friction queue with a clear category on re-parse: parse_fail.watermark_overlap, parse_fail.ocr_below_floor, parse_fail.missing_schedule, or actual_default.

Quarantine & Re-Parse 47 Docs Export List To CSV

Quarantined documents do not affect the live A-F grade view until the re-parse completes. Each re-parsed document writes a structured audit row recording the original failure-mode category and the routing decision.

"Turn the liability into a demonstration of customer care." The forward-only fix becomes a portfolio-wide cleanup the PM can run before the next quarterly review.

Explainability Dashboard

A Single Glance Tells The Risk Officer Where The Radar Has Coverage

Open the portfolio view. The header is a coverage map: how much of the book is on clean pipelines, how much is delayed, how many borrowers the parser could not read, and how many compliance requests are outstanding right now.

Portfolio Data Coverage · 80 borrowers

Updated 2026-04-26 08:14 ET

80%

A / B clean
64 borrowers, real-time or daily push

15%

C / D delayed
12 borrowers, monthly or quarterly cadence

5%

F unreadable
4 borrowers, parser failure logged per failure mode

Compliance Friction

12 borrowers with open requests

Overdue > 7 days

3 borrowers, escalated to PM

Path-To-A Closures (30d)

+5 borrowers, coverage trending up

Risk officers stop seeing "the radar found a breach." They start seeing "the radar covers 95% of the book and is actively closing the remaining 5%." The blind spot becomes a tracked metric, not a hidden liability.

F-Grade Resolution Workflow

The Radar Tells You Where The Blind Spot Is. Then The Workflow Closes It.

F-grade is a parse failure, not a borrower default. The student is not dumb, the paper is destroyed. When the engine quarantines a document, the resolution workflow walks the analyst from "we cannot read page 24" to a clean re-parse without spamming a key sponsor over a blurry scan.

Step 1 · Quarantine Queue Surface

The quarantine queue surfaces every F-grade document with the exact failure mode and the exact pages that failed. The analyst sees a per-document card, not a flat error log.

Quarantine Card Example
Borrower: SilverPeak Acquisitions LLC
Document: Q1 2026 Compliance Certificate.pdf
Failure mode: parse_fail.ocr_below_floor
Pages affected: 17, 24, 38 of 47
Confidence floor: 0.62 (target 0.85)
Suggested action: Request higher-resolution scan

Step 2 · Drag-Drop Higher-Res Replacement

If the fund already has a clean copy, the analyst drags it into the quarantine card. The engine re-parses immediately and writes the resolution path to the audit log. No borrower contact required.

Drop Higher-Res Scan Here or Browse

Step 3 · Semi-Automated Borrower Request (Analyst Reviews + Sends)

If the fund needs to ask the borrower, the engine drafts a templated secure request through the fund's existing client portal. The draft identifies the failure, names the affected pages, and proposes a return cadence. The analyst reviews and clicks send. The system never sends without a human gate; sponsors are never spammed by a parser.

Drafted Request (Editable)

To: SilverPeak Compliance Officer

Subject: Q1 2026 Compliance Certificate, three pages need re-scan

Hi team. Our intake system received the Q1 2026 Compliance Certificate but pages 17, 24, and 38 are below our OCR confidence floor. Could you re-send those three pages at 300 DPI or higher? Thanks. Reply by Friday helps us close out the quarter on schedule.

Review & Send Edit Draft Hold / Escalate To PM

Step 4 · Audit Log Captures Every Path

Every quarantine event and every resolution path writes a structured audit row. The compliance team can prove, document by document, that no F-grade parse failure was silently dropped, that the human-gated borrower request was reviewed before sending, and that the resolution closed within SLA.

2026-04-26T14:22Z quarantine.create doc=silverpeak-q1-cc.pdf failure=ocr_below_floor pages=[17,24,38]
2026-04-26T14:24Z resolution.draft analyst=p.chen template=parse_fail_request_v2
2026-04-26T14:31Z resolution.send analyst=p.chen channel=secure_portal recipient=silverpeak.compliance
2026-04-28T09:15Z resolution.close trigger=re_parse_clean grade_after=B

"It is the ultimate admission that while the machine can scan the horizon, you still need a human to navigate the storm." The workflow keeps the analyst on the bridge, not in the engine room.

A-F Grading: Active Enforcement

True Risk Management Is Defined By How The System Behaves In The Dark

When a borrower hits a D or F grade, COVENANT does not wait. The system auto-generates a templated compliance-enforcement request to the borrower's CFO or CRO, referencing the specific contractual reporting obligations the borrower signed, requesting the missing data, and opening a tracked response timer.

Non-responsive borrowers surface as a daily Compliance Friction report on the PM dashboard, sorted by days-since-request and by underlying credit exposure. The 20% is not celebrated as a blind spot. The 20% is hunted until it becomes the 80%.

The companies with the worst financial-reporting hygiene are historically the first to default in a liquidity crisis. Active enforcement does not pretend otherwise; it goes and gets the data.

CISO Fast-Track Bridge

The Translation Layer, Not A Substitute For Institutional Audit

The COVENANT SOC 2 Equivalence Document is a CISO Fast-Track Bridge for early adopters: it translates the dedicated-infrastructure architecture into the vocabulary a cloud-era SOC 2 checklist already understands. It is not a substitute for an independent audit. It is the bridge that gets early-mover credit funds deployed while the independent audit completes.

Because borrower financial data routes only to dedicated infrastructure under NHN's exclusive control, with no third-party AI vendors and no cloud middlemen in the inference chain, the standard multi-tenant SaaS security risks are bypassed entirely. The architecture itself is the primary security control. The Bridge is the roadmap that proves the sovereign architecture requires a lower burden of proof.

Independent Big-4 SOC 2 Type 2 audit target: Q2 2027. Funded by founder-tier subscription revenue. Published on a public calendar so CISOs can plan around it rather than squint at a self-attested document.

See The Procurement Bridge Request The Bridge Packet →

SOC 2 Equivalence v2: Fortress Framing

We Are Not Safer Because We Passed The Checklist. We Are Safer Because We Don't Have The Cloud Problem.

SOC 2 was written for a world where the vendor holds your data. Every control on that checklist exists to govern how the vendor protects what they hold. COVENANT collapses the threat model by never holding the data in the first place. The structural answer is mathematically stronger than the checklist answer.

CISO Concern
Cloud Vendor Answer
COVENANT Structural Answer
Data breach risk
Encryption at rest, access logs, breach notification SLA, $X cyber liability cap.
No multi-tenant honeypot. Borrower documents route only to customer-scoped capacity on dedicated NHN-owned infrastructure. No third-party AI processor or cloud middleman in the chain.
Multi-tenant data leakage
Tenant isolation testing. Penetration test reports. Bug bounty program.
No multi-tenant deployment exists. Each fund's customer-scoped capacity is single-tenant at the silicon, not at the configuration layer.
Vendor employee access to fund data
Background checks, principle of least privilege, quarterly access review.
Vendor has zero standing access. Post-deployment, NHN cannot reach the data even if it wanted to.
Subprocessor / supply-chain risk
Subprocessor list, flow-down obligations, audit rights.
No subprocessors handle borrower data. The inference engine runs on dedicated NHN-controlled infrastructure with hardware-isolated customer-scoped capacity.
Vendor goes out of business
Hope the acquirer honors the contract. Hope the cloud account does not get suspended mid-migration.
Failsafe Activation Continuity Plan executes. Read-only window for in-flight reviews; both legs of the dual-jurisdiction escrow release source, infrastructure recipes, and cryptographic keys; customer-provisioned independent operation completes inside 60 days.
Vendor gets acquired by a cloud-AI incumbent
Forced cloud migration. Renegotiate the data-handling addendum from a position of weakness.
Sovereignty Preservation Clause triggers escrow release and Architectural Freeze. Acquirer cannot migrate fund workloads onto a multi-tenant cloud.

"Decentralizing the honeypot is mathematically safer than protecting a central target." A SOC 2 audit certifies the central target is well-protected. COVENANT eliminates the target.

Hardware EOL Flex Policy

"Why Are You Highlighting Hardware EOL If The Fund Never Touches Hardware?" Fair Question.

The fund never touches hardware. NHN owns and operates the dedicated infrastructure under our exclusive control; the fund connects via encrypted tunnel from authorized workstations. So what does the EOL Flex Policy actually mean to a fund procurement committee?

It means your subscription, on the flat $4,000 monthly rate or any founder-cohort tier (T1 at $1,449 per year through T5 at $3,499 per year), includes automatic zero-downtime compute upgrades at our facility when the underlying Mac hardware ages out. There is no CapEx surprise. There is no fund-side migration window. There is no hardware refresh you have to budget for.

Policy Element
Fund-Side Mechanic
Underlying compute refresh cadence
NHN-managed on a 36-month rolling cadence. Fund sees zero.
Cost to fund
Zero. Included in subscription. No CapEx surprise on any tier.
Migration downtime
Zero. Customer-scoped capacity migrates between generations behind the tunnel; tunnel session is preserved.
If Apple deprecates an M-series generation
NHN absorbs the early-deprecation risk. Fund sees zero. Snapdragon X Elite, AMD Strix Halo, NVIDIA workstation paths are pre-validated.
Sovereign Guarantee on every tier
Founder T1 at $1,449 carries the same EOL Flex Policy as the standard $4,000 monthly rate. No tier-based exclusion.

Sovereign Guarantee. Hardware lifecycle risk lives with NHN. The fund's only obligation is the subscription. Procurement committees can underwrite the spend without modeling a hardware refresh cycle.

COVENANT vs. A Spreadsheet

Drag the slider to match your portfolio. The math comes from finance teams who still run covenant tracking in Excel.

Portfolio Size
20
companies
Excel & associate hours 4 hrs/company/quarter x 4 quarters
320 hrs
Annual cost of that labor at $175/hr blended associate rate
$56K
COVENANT annual subscription $4,000/month flat, unlimited tests
$48K
Hours your team gets back COVENANT auto-runs continuously
310 hrs
The missed-breach math. One contagion storm missed on a single mid-market LBO has cost PE sponsors $100M+ in workout fees, forced equity cures, and accelerated lender negotiations. COVENANT pays for itself the first time its radar catches one.

Estimates based on industry PE ops benchmarks. Your mileage varies with fund size, covenant complexity, and how busy your FP&A team already is.

See COVENANT vs. Hiring An Analyst →

Investment

Two ways to buy. Pick the one that fits how your fund procures software.

Option A · Monthly Recurring

$4,000 / month, flat

  • ✓ Unlimited covenant tests, unlimited borrowers
  • ✓ Month-to-month commitment, cancel any time
  • ✓ Same local-inference architecture, same support
  • ✓ Roughly $48,000 annualized at the flat rate

For funds whose procurement requires monthly billing or an exit ramp inside 12 months. Net new cash spend, no annual commit.

Best Value

Option B · Annual Founder Ladder

$1,449 → $4,990 / year

  • ✓ Tier 1 Early Adopter: $1,449/yr (save 71%)
  • ✓ Five tiers, capped at 234 founder licenses
  • ✓ Founder rate held for 12 months from purchase
  • ✓ Locks to $4,990/yr standard once the 234 are gone

For funds happy to commit annually in exchange for a defined founder rate. Tier prices rise as licenses sell. Discount is real, the window is finite.

Both options unlock the same product on the same architecture. Procurement teams cross-verify pricing at finance.nohumannearby.com - the prices on this page are the only authoritative quote.

AVAILABLE NOW
Early Adopter Tier
$4,990/yr
$1,449/yr
Save 71%
24 of 24 spots left
When this tier sells out, price increases to $1,849/yr
✓ Unlimited companies
✓ AI financial extraction
✓ Covenant monitoring
✓ Ratio calculations
✓ Compliance testing
✓ Data never leaves your machine
✓ Sovereignty Badge for LP trust pages
Sovereignty Badge
Display this on your fund's LP trust page. Investors see sovereign AI proof.
CLAIM YOUR COVENANT FOUNDER LICENSE
0 founders have already secured their license

234 Founder Licenses.
That's It.

Once they're gone, it's full price. Lock in your rate before the next tier fills.